security

4 tutorial series · 8 posts

Tutorial Series

Posts

OAuth 2.0 – In A Nutshell

What is OAuth 2.0 ? Did you know there are many different grant types? A grant type for each type of application you want to create? Come one, lets take a look...

Portable Laptop Pi-Hole and Unbound DNS resolver

Run Pi-Hole and Unbound locally on your own laptop so that you have a portable 'as secure as can be' internet browsing experience. DNS - just a modern telephone book.

VPN Kill Switch With Docker

You might have set up some great rules in your iptables to act as a kill switch, only to find out that on installing Docker and running some containers they completely override your rules. Fortunately the fix is easy. Let me show you how. 1. Required Reading I’m going to apply the fix to my...

OpenVPN: Create A Linux VPN iptables Killswitch

If your VPN connection drops your machine usually continues to connect to the internet leaking information. Let me show you how to make an iptables killswitch.

Secure Your Linux Laptop With iptables

Your linux powered laptop is open and vulnerable. Let's harden it a little with the linux iptables firewall. It's not that hard, honest... it is just a text file.

Pi-hole: A Portable Docker Laptop Solution

If you like the network-wide protection your home pi-hole provides against adverts, domains that are known phishing sites, or domains that are known to serve malware, then you are going to love finding out that you can have a local laptop install of pi-hole and take it with you where ever you go.

How To Clone A Git Repo With SSH Keys

A look at how to clone a Github repository using SSH key pairs, and guidance on how to handle multiple Github accounts on the same machine.

Generate SSH keys with ssh-keygen

A quick start guide to generate your own SSH public/private keypair. A look at generating both RSA and the more secure Elliptic Curve Ed25519 key type.